{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:19:32Z","timestamp":1730200772408,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972293"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/bigdatasecurityhpscids54978.2022.00019","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:25:00Z","timestamp":1656365100000},"page":"48-53","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Learner Behavior Analysis Based on Educational Big Data and Dynamic Bayesian Network"],"prefix":"10.1109","author":[{"given":"Fang","family":"Liu","sequence":"first","affiliation":[{"name":"Wuhan University,School of Computer Science,Wuhan,China"}]},{"given":"Zimeng","family":"Fan","sequence":"additional","affiliation":[{"name":"Wuhan University of Science and Technology,College of Computer Science,Wuhan,China"}]},{"given":"Feihu","family":"Huang","sequence":"additional","affiliation":[{"name":"Wuhan University of Science and Technology,College of Computer Science,Wuhan,China"}]},{"given":"Yining","family":"Li","sequence":"additional","affiliation":[{"name":"Wuhan University of Science and Technology,College of Computer Science,Wuhan,China"}]},{"given":"Yanxiang","family":"He","sequence":"additional","affiliation":[{"name":"Wuhan University,School of Computer Science,Wuhan,China"}]},{"given":"Wei","family":"Hu","sequence":"additional","affiliation":[{"name":"Wuhan University of Science and Technology,College of Computer Science,Wuhan,China"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2443"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.nucengdes.2016.06.010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2973467"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2016.21"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jal.2016.11.030"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2784"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529651"},{"journal-title":"IEEE Trans Systems Man and Cybernetics (B)","article-title":"H infinite state estimation for discrete-time chaotic systems based on a unified model","year":"2012","author":"liu","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2009.02.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2011.18"},{"key":"ref14","first-page":"25","article-title":"Efficient algorithm of energy minimization for heterogeneous wireless sensor network","author":"qiu","year":"0","journal-title":"IEEE EUC Conf"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2007.06.014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2013.55"},{"key":"ref17","first-page":"13","article-title":"Accessing big data in education:acquisition and sharing of learning experience data based on xAPI specification","volume":"5","author":"xiaoqing","year":"2014","journal-title":"Modern Distance Education Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2006.322537"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.09.007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568042"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X14523038"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2556325.2566237"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2959"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2500876"},{"journal-title":"Office of Technology for Education","article-title":"Enhancing teaching and learning through educational data mining and learning analytics : An issue brief","year":"2012","author":"bienkowski","key":"ref8"},{"key":"ref7","article-title":"Connectivism: A learning theory for the digital age","volume":"2","author":"siemens","year":"2004","journal-title":"Int J Instr Technol Distance Learn"},{"key":"ref2","first-page":"316","article-title":"IoTDeM: An IoT Big Data-oriented MapReduce performance prediction extended model in multiple edge clouds","volume":"118","author":"lu","year":"2018","journal-title":"JPDC"},{"journal-title":"Monitoring student learning in the classroom school improvement research series close-up# 4","year":"1988","author":"cotton","key":"ref9"},{"key":"ref1","first-page":"1565","article-title":"Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability","volume":"72","author":"niu","year":"2012","journal-title":"JPDC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA51983.2021.9403166"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.052"},{"volume":"1","journal-title":"Design Recommendations for Intelligent Tutoring Systems Learner Modeling","year":"2013","author":"sottilare","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCOMS.2018.8463316"},{"key":"ref23","first-page":"333","article-title":"Poisson-based inference for perturbation models in adaptive spelling training","volume":"20","author":"baschera","year":"2010","journal-title":"Int'l J of Arti Inte in Education"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2895033"}],"event":{"name":"2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)","start":{"date-parts":[[2022,5,6]]},"location":"Jinan, China","end":{"date-parts":[[2022,5,8]]}},"container-title":["2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9799288\/9799436\/09799479.pdf?arnumber=9799479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:19:03Z","timestamp":1658780343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9799479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/bigdatasecurityhpscids54978.2022.00019","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}